diff options
author | jgh <jgh@FreeBSD.org> | 2012-05-25 07:46:50 +0800 |
---|---|---|
committer | jgh <jgh@FreeBSD.org> | 2012-05-25 07:46:50 +0800 |
commit | 5aa7a40a3447b034c2f5c76fb78c315ed33aaeda (patch) | |
tree | 67040975594dc837f6b4d3eab2a255c2219bab78 /security | |
parent | 9306648af1b1dc48717b6eb0673c9d2a93cbab13 (diff) | |
download | freebsd-ports-gnome-5aa7a40a3447b034c2f5c76fb78c315ed33aaeda.tar.gz freebsd-ports-gnome-5aa7a40a3447b034c2f5c76fb78c315ed33aaeda.tar.zst freebsd-ports-gnome-5aa7a40a3447b034c2f5c76fb78c315ed33aaeda.zip |
- document security issue for haproxy
PR: ports/165035
Submitted by: jgh@
Security: CVE-2012-2391
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e1599c148b8f..033c89947933 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -52,6 +52,42 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="617959ce-a5f6-11e1-a284-0023ae8e59f0"> + <topic>haproxy -- buffer overflow</topic> + <affects> + <package> + <name>haproxy</name> + <range><lt>1.4.21</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>HAProxy reports:</p> + <blockquote cite="http://haproxy.1wt.eu/news.html"> + <p>A flaw was reported in HAProxy where, due to a boundary error + when copying data into the trash buffer, an external attacker could + cause a buffer overflow. Exploiting this flaw could lead to the + execution of arbitrary code, however it requires non-default settings + for the global.tune.bufsize configuration option (must be set to a + value greater than the default), and also that header rewriting is + enabled (via, for example, the regrep or rsprep directives). + This flaw is reported against 1.4.20, prior versions may also be + affected.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-2391</cvename> + <url>https://secunia.com/advisories/49261/</url> + <url>http://haproxy.1wt.eu/download/1.4/src/CHANGELOG</url> + <url>http://haproxy.1wt.eu/git?p=haproxy-1.4.git;a=commit;h=30297cb17147a8d339eb160226bcc08c91d9530b</url> + </references> + <dates> + <discovery>2012-05-21</discovery> + <entry>2012-05-24</entry> + </dates> + </vuln> + <vuln vid="e0a969e4-a512-11e1-90b4-e0cb4e266481"> <topic>RT -- Multiple Vulnerabilities</topic> <affects> |